A New Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support

Author(s): A. V. N. Krishna | A. Vinaya Babu
Volume: 11
Issue: 3
Year: 2010





Phishing Secrets: History, Effects, and Countermeasures

Author(s): Antonio San Martino | Xavier Perramon
Volume: 11
Issue: 3
Year: 2010





Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves

Author(s): Sameh M. Shohdy | Ashraf B. El-Sisi | Nabil Ismail
Volume: 11
Issue: 3
Year: 2010





Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves

Author(s): Zhixiong Chen | Li Xu | Chenhuang Wu
Volume: 11
Issue: 3
Year: 2010





Performance Evaluation of Mobility Speed over MANET Routing Protocols

Author(s): Yasser Kamal Hassan | Mohamed Hashim Abd El-Aziz | Ahmed Safwat Abd El-Radi
Volume: 11
Issue: 3
Year: 2010





A Novel Digital Envelope Approach for A Secure E-Commerce Channel

Author(s): Ramachandran Ganesan | Mohan Gobi | Kanniappan Vivekanandan
Volume: 11
Issue: 3
Year: 2010





On the Security Cost of Interval Multicast

Author(s): Weifeng Chen | Ye Sun | Anthony S. Pyzdrowski
Volume: 10
Issue: 3
Year: 2010





An Enhanced Remote User Authentication Scheme with Smart Card

Author(s): Manoj Kumar
Volume: 10
Issue: 3
Year: 2010





Dynamic Key Cryptography and Applications

Author(s): Huy Hoang Ngo | Xianping Wu | Phu Dung Le | Campbell Wilson | Balasubramaniam Srinivasan
Volume: 10
Issue: 3
Year: 2010





How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?

Author(s): Quoc-Cuong Le | Patrick Bellot
Volume: 9
Issue: 3
Year: 2009





An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP)

Author(s): Mohammad Reza Ahmadi
Volume: 9
Issue: 3
Year: 2009





Security and Trust in Digital Rights Management: A Survey

Author(s): Zhiyong Zhang | Qingqi Pei | Jianfeng Ma | Lin Yang
Volume: 9
Issue: 3
Year: 2009





Analysis of Two Types Deniable Authentication Protocols

Author(s): Haibo Tian | Xiaofeng Chen | Yong Ding
Volume: 9
Issue: 3
Year: 2009





An Overall Cost-effective Authentication Technique for the Global Mobility Network

Author(s): Chang-Kuo Yeh | Wei-Bin Lee
Volume: 9
Issue: 3
Year: 2009





Knapsack Based ECC Encryption and Decryption

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar | M. Indra Devi | M. Suguna
Volume: 9
Issue: 3
Year: 2009





Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks

Author(s): Moon-Chuen Lee | Yi-Jun He | Zhaole Chen
Volume: 9
Issue: 3
Year: 2009





Toward a Practical Packet Marking Approach for IP Traceback

Author(s): Chao Gong | Kamil Sarac
Volume: 8
Issue: 3
Year: 2009





Policy-driven and Content-based Web Services Security Gateway

Author(s): Zein Radwan | Camille Gaspard | Ayman Kayssi | Ali Chehab
Volume: 8
Issue: 3
Year: 2009





Performance Analysis of Soft Computing Based Anomaly Detectors

Author(s): N. Srinivasan | V. Vaidehi
Volume: 7
Issue: 3
Year: 2008





Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior

Author(s): Xin Tang | Constantine N. Manikopoulos | Sotirios G. Ziavras
Volume: 7
Issue: 3
Year: 2008





On Cipher Design Based on Switchable Controlled Operations

Author(s): Nikolay A. Moldovyan
Volume: 7
Issue: 3
Year: 2008





Multiplicative Forward-Secure Threshold Signature Scheme

Author(s): Sherman S. M. Chow | H. W. Go | Lucas C. K. Hui | S. M. Yiu
Volume: 7
Issue: 3
Year: 2008





Probabilistic Analysis and Verification of the ASW Protocol using PRISM

Author(s): Salekul Islam | Mohammad Abu Zaid
Volume: 7
Issue: 3
Year: 2008





Tamper Resistant Software Through Intent Protection

Author(s): Alec Yasinsac | J. Todd McDonald
Volume: 7
Issue: 3
Year: 2008





ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks

Author(s): Ashok Kumar Das
Volume: 7
Issue: 3
Year: 2008





Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing

Author(s): Shengbao Wang | Zhenfu Cao | Haiyong Bao
Volume: 7
Issue: 3
Year: 2008





Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching

Author(s): Yeung Siu Fung | John C.S. Lui | David K.Y. Yau
Volume: 7
Issue: 3
Year: 2008





A Fragile Associative Watermarking on 2D Barcode for Data Authentication

Author(s): Jau-Ji Shen | Po-Wei Hsu
Volume: 7
Issue: 3
Year: 2008





Improved Security Mechanism for Mobile IPv6

Author(s): Jing Li | Po Zhang | Srinivas Sampalli
Volume: 6
Issue: 3
Year: 2008





Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method

Author(s): Satoshi Kurosawa | Hidehisa Nakayama | Nei Kato | Abbas Jamalipour | Yoshiaki Nemoto
Volume: 5
Issue: 3
Year: 2007





Elliptic Curve Cryptography Based Wireless Authentication Protocol

Author(s): Liu Yongliang | Wen Gao | Hongxun Yao | Xinghua Yu
Volume: 5
Issue: 3
Year: 2007





A Biometric Identity Based Signature Scheme

Author(s): Andrew Burnett | Fergus Byrne | Tom Dowling | Adam Duffy
Volume: 5
Issue: 3
Year: 2007





A Policy-Oriented Language for Expressing Security Specifications

Author(s): Carlos Ribeiro | Paulo Ferreira
Volume: 5
Issue: 3
Year: 2007





Efficient Directory Harvest Attacks and Countermeasures

Author(s): Boldizsár Bencsáth | István Vajda
Volume: 5
Issue: 3
Year: 2007





A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes

Author(s): Yongwei Wang | Venkata C. Giruka | Mukesh Singhal
Volume: 5
Issue: 3
Year: 2007





Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

Author(s): Nawal El-Fishawy | Osama M. Abu Zaid
Volume: 5
Issue: 3
Year: 2007





Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes

Author(s): Tianjie Cao | Xianping Mao
Volume: 4
Issue: 3
Year: 2007





An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies

Author(s): Debasis Giri | Parmeshwary Dayal Srivastava
Volume: 4
Issue: 3
Year: 2007





Evolutionary Design of Intrusion Detection Programs

Author(s): Ajith Abraham | Crina Grosan | Carlos Martin-Vide
Volume: 4
Issue: 3
Year: 2007





Privacy-Preserving Data Mining in Electronic Surveys

Author(s): Justin Zhan | Stan Matwin
Volume: 4
Issue: 3
Year: 2007





A Novel Approach to Hide Credentials

Author(s): Zhensong Liao | Hai Jin | Deqin Zou | Weizhong Qiang
Volume: 4
Issue: 3
Year: 2007





An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection

Author(s): Zonghua Zhang | Hong Shen | Yingpeng Sang
Volume: 4
Issue: 3
Year: 2007





Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner

Author(s): Willy Susilo | Hiroaki Kikuchi
Volume: 4
Issue: 3
Year: 2007





ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications

Author(s): Shameem Ahmed | Moushumi Sharmin | Sheikh Iqbal Ahamed
Volume: 4
Issue: 3
Year: 2007





LFSR-based Signatures with Message Recovery

Author(s): Xiangxue Li | Dong Zheng | Kefei Chen
Volume: 4
Issue: 3
Year: 2007





Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection

Author(s): K. Karthik | D. Hatzinakos
Volume: 4
Issue: 3
Year: 2007





Mobility Management with Distributed AAA Architecture

Author(s): Lin-huang Chang | Che Lin Lo | Jui Jen Lo | Wei Ting Liu | hou Chen Yang
Volume: 4
Issue: 3
Year: 2007





Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme

Author(s): Zuhua Shao
Volume: 3
Issue: 3
Year: 2006





Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration

Author(s): Khin Mi Mi Aung | Kiejin Park | Jong Sou Park
Volume: 3
Issue: 3
Year: 2006





Authentication and Key Agreement Protocols Preserving Anonymity

Author(s): Kumar V. Mangipudi | Rajendra S. Katti | Huirong Fu
Volume: 3
Issue: 3
Year: 2006





Alert Correlation for Extracting Attack Strategies

Author(s): Bin Zhu | Ali A. Ghorbani
Volume: 3
Issue: 3
Year: 2006





Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions

Author(s): Shijun Xiang | Jiwu Huang
Volume: 3
Issue: 3
Year: 2006





Security on Generalized Feistel Scheme with SP Round Function

Author(s): Wenling Wu | Wentao Zhang | Dongdai Lin
Volume: 3
Issue: 3
Year: 2006





Security in Pervasive Computing: Current Status and Open Issues

Author(s): Munirul Haque | Sheikh Iqbal Ahamed
Volume: 3
Issue: 3
Year: 2006





Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control

Author(s): Deholo Nali | Carlisle Adams | Ali Miri
Volume: 1
Issue: 3
Year: 2005





The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection

Author(s): Zhuowei Li | Amitabha Das
Volume: 1
Issue: 3
Year: 2005





On the Security of Yuan et al.'s Undeniable Signature Scheme

Author(s): Wei Zhao
Volume: 11
Issue: 3
Year: 2010





Formal Specification of Common Criteria Based Access Control Policy Model

Author(s): Manpreet Singh | Manjeet S. Patterh
Volume: 11
Issue: 3
Year: 2010





Comment on Wu et al.'s Server-aided Verification Signature Schemes

Author(s): Zhiwei Wang | Licheng Wang | Yixian Yang | Zhengming Hu
Volume: 10
Issue: 3
Year: 2010





LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks

Author(s): M. Razvi Doomun | K. M. Sunjiv Soyjaudah
Volume: 10
Issue: 3
Year: 2010





A Provably Secure and Efficient Strong Designated Verifier Signature Scheme

Author(s): Fuw-Yi Yang | Cai-Ming Liao
Volume: 10
Issue: 3
Year: 2010





Evaluating The Performance of Symmetric Encryption Algorithms

Author(s): Diaa Salama Abd Elminaam | Hatem Mohamed Abdual Kader | Mohiy Mohamed Hadhoud
Volume: 10
Issue: 3
Year: 2010





Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network

Author(s): Ramanarayana Kandikattu | Lillykutty Jacob
Volume: 10
Issue: 3
Year: 2010





New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity

Author(s): Tongjiang Yan
Volume: 10
Issue: 3
Year: 2010





Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks

Author(s): Abedelaziz Mohaisen | DaeHun Nyang | KyungHee Lee
Volume: 8
Issue: 3
Year: 2009





Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack

Author(s): Chunbo Ma | Jun Ao
Volume: 8
Issue: 3
Year: 2009





An Anonymous Sealed-bid Electronic Auction Based on Ring Signature

Author(s): Hu Xiong | Zhiguang Qin | Fagen Li
Volume: 8
Issue: 3
Year: 2009





A Related Key Attack on the Feistel Type Block Ciphers

Author(s): Ali Bagherzandi | Mahmoud Salmasizadeh | Javad Mohajeri
Volume: 8
Issue: 3
Year: 2009





Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality

Author(s): Dan Lu | Yoshitake Kobayashi | Ken Nakayama | Mamoru Maekawa
Volume: 7
Issue: 3
Year: 2008





Proof of Forward Security for Password-based Authenticated Key Exchange

Author(s): Shuhua Wu | Yuefei Zhu
Volume: 7
Issue: 3
Year: 2008





A Key Management Scheme for Hierarchical Access Control in Group Communication

Author(s): Qiong Zhang | Yuke Wang | Jason P. Jue
Volume: 7
Issue: 3
Year: 2008





Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability

Author(s): Ali Bagherzandi | Javad Mohajeri | Mahmoud Salmasizadeh
Volume: 6
Issue: 3
Year: 2008





Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques

Author(s): Nalini N | G. Raghavendra Rao
Volume: 6
Issue: 3
Year: 2008





Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation

Author(s): Men Long | Chwan-Hwa "John" Wu | J. David Irwin
Volume: 6
Issue: 3
Year: 2008





An Effective Anomaly Detection Method in SMTP Traffic

Author(s): Hao Luo | Binxing Fang | Xiaochun Yun | Zhigang Wu
Volume: 6
Issue: 3
Year: 2008





Wavelet-based Real Time Detection of Network Traffic Anomalies

Author(s): Chin-Tser Huang | Sachin Thareja | Yong-June Shin
Volume: 6
Issue: 3
Year: 2008





A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine

Author(s): Zaiqiang Liu | Dongdai Lin | Fengdeng Guo
Volume: 6
Issue: 3
Year: 2008





A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting

Author(s): Tony Thomas | Arbind Kumar Lal
Volume: 6
Issue: 3
Year: 2008





Formal Protocol Design of ESIKE Based on Authentication Tests

Author(s): Rui Jiang | Aiqun Hu | Jianhua Li
Volume: 6
Issue: 3
Year: 2008





Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol

Author(s): Theodore Stergiou | Dimitrios L. Delivasilis
Volume: 5
Issue: 3
Year: 2007





Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol

Author(s): Mohamed Layouni | Jozef Hooman | Sofiène Tahar
Volume: 5
Issue: 3
Year: 2007





A Sequential Distinguisher for Covert Channel Identification

Author(s): K. P. Subbalakshmi | Rajarathnam Chandramouli | Nagarajan Ranganathan
Volume: 5
Issue: 3
Year: 2007





Secure Logging for Irrefutable Administration

Author(s): Paolo Dal Checco | Francesco Bergadano | Davide Cavagnino | Pasquale Andrea Nesta | Michele Miraglia | Pier Luigi Zaccone
Volume: 4
Issue: 3
Year: 2007





Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings

Author(s): Manik Lal Das | Ashutosh Saxena | Deepak B. Phatak
Volume: 4
Issue: 3
Year: 2007





Related-Mode Attacks on CTR Encryption Mode

Author(s): Dayin Wang | Dongdai Lin | Wenling Wu
Volume: 4
Issue: 3
Year: 2007





On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification

Author(s): Rongxing Lu | Zhenfu Cao | Jun Shao
Volume: 4
Issue: 3
Year: 2007





Secure Internet Applications Based on Mobile Agents

Author(s): Cungang Yang
Volume: 2
Issue: 3
Year: 2006





Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy

Author(s): Zhi Zhou | Kin Choomg Yow
Volume: 2
Issue: 3
Year: 2006





A Hash-based Strong Password Authentication Protocol with User Anonymity

Author(s): Kumar V. Mangipudi | Rajendra S. Katti
Volume: 2
Issue: 3
Year: 2006





A Directed Signature Scheme Based on RSA Assumption

Author(s): Rongxing Lu | Zhenfu Cao
Volume: 2
Issue: 3
Year: 2006





Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode

Author(s): Huafei Zhu
Volume: 2
Issue: 3
Year: 2006





Reversible Watermarking: Current Status and Key Issues

Author(s): Jen-Bang Feng | Iuon-Chang Lin | Chwei-Shyong Tsai | Yen-Ping Chu
Volume: 2
Issue: 3
Year: 2006





The Wireless Application Protocol

Author(s): Dave Singelee | Bart Preneel
Volume: 1
Issue: 3
Year: 2005





Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols

Author(s): Kim-Kwang Raymond Choo
Volume: 1
Issue: 3
Year: 2005





Co-operative Private Equality Test

Author(s): Ronghua Li | Chuankun Wu
Volume: 1
Issue: 3
Year: 2005





Two Attacks on the Wu-Hsu User Identification Scheme

Author(s): Cheng-Chi Lee
Volume: 1
Issue: 3
Year: 2005





Threshold Signatures: Current Status and Key Issues

Author(s): Min-Shiang Hwang | Ting-Yi Chang
Volume: 1
Issue: 3
Year: 2005





A Proxy Blind Signature Scheme over Braid Groups

Author(s): Girraj Kumar Verma
Volume: 9
Issue: 3
Year: 2009





On a Family of Minimal Candidate One-way Functions and One-way Permutations

Author(s): Danilo Gligoroski
Volume: 8
Issue: 3
Year: 2009





Agent-based Intrusion Detection For Network-based Application

Author(s): Jianping Zeng | Donghui Guo
Volume: 8
Issue: 3
Year: 2009





Weak Composite Diffie-Hellman

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh
Volume: 7
Issue: 3
Year: 2008





Multi-Designated Verifiers Signatures Revisited

Author(s): Sherman S. M. Chow
Volume: 7
Issue: 3
Year: 2008





Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings

Author(s): Rongxing Lu | Zhenfu Cao
Volume: 5
Issue: 3
Year: 2007





Is There a Shortage of Primes for Cryptography?

Author(s): Samuel S. Wagstaff, Jr.
Volume: 3
Issue: 3
Year: 2006





Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards

Author(s): Ren-Chiun Wang | Chou-Chen Yang
Volume: 3
Issue: 3
Year: 2006





A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz

Author(s): Mustapha Hedabou
Volume: 3
Issue: 3
Year: 2006





Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach

Author(s): Rama Murthy Garimella
Volume: 3
Issue: 3
Year: 2006





A Memory Symptom-based Virus Detection Approach

Author(s): Hsien-Chou Liao | Yi-Hsiang Wang
Volume: 2
Issue: 3
Year: 2006





Algorithms and Approaches of Proxy Signature: A Survey

Author(s): Manik Lal Das | Ashutosh Saxena | Deepak B Phatak
Volume: 9
Issue: 3
Year: 2009





On Security of An Efficient Nonce-based Authentication Scheme for SIP

Author(s): Cheng-Chi Lee
Volume: 9
Issue: 3
Year: 2009





Edon-R, An Infinite Family of Cryptographic Hash Functions

Author(s): Danilo Gligoroski | Smile Markovski | Ljupco Kocarev
Volume: 8
Issue: 3
Year: 2009





LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption

Author(s): Somanath Tripathy | Sukumar Nandi
Volume: 8
Issue: 3
Year: 2009





Provably Secure Identity-based Threshold Key Escrow from Pairing

Author(s): Yu Long | Zheng Gong | Kefei Chen | Shengli Liu
Volume: 8
Issue: 3
Year: 2009





On the Security of ``Golden'' Cryptography

Author(s): angel Martin del Rey | Gerardo Rodriguez Sa¡nchez
Volume: 7
Issue: 3
Year: 2008





A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying

Author(s): Depeng Li | Srinivas Sampalli
Volume: 6
Issue: 3
Year: 2008





Distributed Paillier Plaintext Equivalence Test

Author(s): Pei-Yih Ting | Xiao-Wei Huang
Volume: 6
Issue: 3
Year: 2008





Improving the Novikov and Kiselev User Authentication Scheme

Author(s): Min-Ho Kim | Cetin Kaya Koc
Volume: 6
Issue: 3
Year: 2008





A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying

Author(s): Depeng Li
Volume: 6
Issue: 3
Year: 2008





Comments on "Improved Efficient Remote User Authentication Schemes"

Author(s): Manik Lal Das
Volume: 6
Issue: 3
Year: 2008





A Self-Concealing Mechanism for Authentication of Portable Communication Systems
Author(s): Wei-Bin Lee
Volume: 6
Issue: 3
Year: 2008




Attacks on An ISO/IEC 11770-2 Key Establishment Protocol

Author(s): Zhaohui Cheng | Richard Comley
Volume: 3
Issue: 3
Year: 2006





Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems

Author(s): Alberto Peinado Dominguez
Volume: 3
Issue: 3
Year: 2006





Ideal Secret Sharing Schemes from Permutations

Author(s): Josef Pieprzyk | Xian-Mo Zhang
Volume: 2
Issue: 3
Year: 2006





A Class of Data-Dependent Operations

Author(s): Nikolay A. Moldovyan | Alexander A. Moldovyan | Michael A. Eremeev
Volume: 2
Issue: 3
Year: 2006





Comment on the Public Key Substitution Attacks

Author(s): Xiaofeng Chen | Fangguo Zhang | Baodian Wei
Volume: 1
Issue: 3
Year: 2005





On the Authentication of the User from the Remote Autonomous Object

Author(s): Amit K Awasthi
Volume: 1
Issue: 3
Year: 2005





Automatic Multi-step Attack Pattern Discovering

Author(s): Li Wang | Ali Ghorbani | Yao Li
Volume: 10
Issue: 2
Year: 2010





Lightweight PKI for WSN uPKI

Author(s): Benamar Kadri | Mohammed Feham | Abdallah M'hamed
Volume: 10
Issue: 2
Year: 2010





MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks

Author(s): Hongwei Li | Atam P. Dhawan
Volume: 10
Issue: 2
Year: 2010





Verifiable Attribute Based Encryption

Author(s): Qiang Tang | Dongyao Ji
Volume: 10
Issue: 2
Year: 2010





Computing the Modular Inverse of a Polynomial Function over GF(2^P) Using Bit Wise Operation

Author(s): Rajaram Ramasamy | Amutha Prabakar Muniyandi
Volume: 10
Issue: 2
Year: 2010





Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks

Author(s): Aikaterini Mitrokotsa | Nikos Komninos | Christos Douligeris
Volume: 10
Issue: 2
Year: 2010





Integrated Intrusion Detection System Using Soft Computing

Author(s): S Selvakani Kandeeban | Rengan S Rajesh
Volume: 10
Issue: 2
Year: 2010





Design Universal Security Scheme for Broadband Router

Author(s): Xiaozhuo Gu | Jianzu Yang
Volume: 10
Issue: 2
Year: 2010





Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods

Author(s): Güenther Lackner | Udo Payer | Peter Teufl
Volume: 9
Issue: 2
Year: 2009





Defending Network-based Services Against Denial of Service Attacks

Author(s): Jinu Kurian | Kamil Sarac
Volume: 9
Issue: 2
Year: 2009





Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance

Author(s): Cong Jin | Jun Liu | Qinghua Deng
Volume: 9
Issue: 2
Year: 2009





Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks

Author(s): Tim Landstra | Sarangapani Jagannathan | Maciej Zawodniok
Volume: 9
Issue: 2
Year: 2009





Authentication Protocol Using Quantum Superposition States

Author(s): Yoshito Kanamori | Seong-Moo Yoo | Don A. Gregory | Frederick T. Sheldon
Volume: 9
Issue: 2
Year: 2009





Receiver-deniable Public-Key Encryption

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 2
Year: 2009





Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)

Author(s): Brian King
Volume: 8
Issue: 2
Year: 2009





Rank Functions Based Inference System for Group Key Management Protocols Verification

Author(s): Amjad Gawanmeh | Adel Bouhoula | Sofiene Tahar
Volume: 8
Issue: 2
Year: 2009





A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems

Author(s): Hasan Mohammed Hasan Husei | Bayoumi I. Bayoumi | Fathy Saad Holail | Bahaa Eldin M. Hasan | Mohammed Z. Abd El-Mageed
Volume: 8
Issue: 2
Year: 2009





Efficient Dealer-Less Threshold Sharing of Standard RSA

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 2
Year: 2009





Virtual Invisible Disk Design for Information System Security

Author(s): Faisal Nabi
Volume: 8
Issue: 2
Year: 2009





Ordered Semiring-based Trust Establish Model with Risk Evaluating

Author(s): Mingwu Zhang | Bo Yang | Shenglin Zhu | Wenzheng Zhang
Volume: 8
Issue: 2
Year: 2009





A New Type of Designated Confirmer Signatures for a Group of Individuals

Author(s): Baodian Wei | Fangguo Zhang | Xiaofeng Chen
Volume: 7
Issue: 2
Year: 2008





Pass-Go: A Proposal to Improve the Usability of Graphical Passwords

Author(s): Hai Tao | Carlisle Adams
Volume: 7
Issue: 2
Year: 2008





ID-based Weak Blind Signature From Bilinear Pairings

Author(s): Ze-mao Zhao
Volume: 7
Issue: 2
Year: 2008





A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability

Author(s): Tarun Bhaskar | Narasimha Kamath B | Soumyo D Moitra
Volume: 7
Issue: 2
Year: 2008





Fault Tolerant Weighted Voting Algorithms

Author(s): Azad Azadmanesh | Alireza Farahani | Lotfi Najjar
Volume: 7
Issue: 2
Year: 2008





A New General Transparency Model for Block-based Watermarking Method

Author(s): Fangjun Huang
Volume: 7
Issue: 2
Year: 2008





A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

Author(s): Debasis Giri | P. D. Srivastava
Volume: 7
Issue: 2
Year: 2008





Repairing Efficient Threshold Group Signature Scheme

Author(s): Zuhua Shao
Volume: 7
Issue: 2
Year: 2008





Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks

Author(s): Eyad Taqieddin | S. Jagannathan | Ann Miller
Volume: 7
Issue: 2
Year: 2008





Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy

Author(s): Shengbao Wang | Zhenfu Cao | Feng Cao
Volume: 7
Issue: 2
Year: 2008





Improvement on Nominative Proxy Signature Schemes

Author(s): Zuo-Wen Tan
Volume: 7
Issue: 2
Year: 2008





Scalable Delay-constrained Multicast Group Key Management

Author(s): Said Gharout | Yacine Challal | Abdelmadjid Bouabdallah
Volume: 7
Issue: 2
Year: 2008





Cryptanalysis of Syverson's Rational Exchange Protocol

Author(s): Almudena Alcaide | uan M. Estevez-Tapiador | Julio C. Hernandez-Castro | Arturo Ribagorda
Volume: 7
Issue: 2
Year: 2008





A Reputation-based Trust Management System for P2P Networks

Author(s): Ali Aydin Selçuk | Ersin Uzun | Mark Resat Pariente
Volume: 6
Issue: 2
Year: 2008





Security Requirements for RFID Computing Systems

Author(s): Xiaolan Zhang | Brian King
Volume: 6
Issue: 2
Year: 2008





Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme

Author(s): Mohammed Misbahuddin | C. Shoba Bindu
Volume: 6
Issue: 2
Year: 2008





SurePath: An Approach to Resilient Anonymous Routing

Author(s): Yingwu Zhu | Yiming Hu
Volume: 6
Issue: 2
Year: 2008





Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems

Author(s): Zine-Eddine Abid | Wei Wang
Volume: 6
Issue: 2
Year: 2008





Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme

Author(s): Fang-Ping Chiang | Yi-Mien Lin | Ya-Fen Chang
Volume: 6
Issue: 2
Year: 2008





Solutions to Key Exposure Problem in Ring Signature

Author(s): Joseph K. Liu | Duncan S. Wong
Volume: 6
Issue: 2
Year: 2008





Security Measures and Weaknesses of the GPRS Security Architecture

Author(s): Christos Xenakis
Volume: 6
Issue: 2
Year: 2008





LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System

Author(s): Mohamad Eid | Hassan Artail | Ayman Kayssi | Ali Chehab
Volume: 6
Issue: 2
Year: 2008





An Identity-based Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks

Author(s): Ashok Kumar Das
Volume: 6
Issue: 2
Year: 2008





Application-Specific Key Release Scheme from Biometrics

Author(s): Ong Thian Song | Andrew Teoh Beng Jin | David Chek Ling Ngo
Volume: 6
Issue: 2
Year: 2008





A Multi-band Wavelet Watermarking Scheme

Author(s): Xiangui Kang | Wenjun Zeng | Jiwu Huang
Volume: 6
Issue: 2
Year: 2008





A Genetic Algorithm for Cryptanalysis of DES-8

Author(s): Hasan Mohammed Hasan Husein | Bayoumi I. Bayoumi | Fathy Saad Holail | Bahaa Eldin M. Hasan | Mohammed Z. Abd El-Mageed
Volume: 5
Issue: 2
Year: 2007





A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices

Author(s): Chetan Nanjunda Mathur | K. P. Subbalakshmi
Volume: 5
Issue: 2
Year: 2007





A More Efficient Instantiation of Witness-Indistinguishable Signature

Author(s): Joseph K. Liu | Duncan S. Wong
Volume: 5
Issue: 2
Year: 2007





A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems

Author(s): Lirong Dai | Kendra Cooper
Volume: 5
Issue: 2
Year: 2007





Enhanced DSR for MANET with Improved Secured Route Discovery and QoS

Author(s): Anil Rawat | Prakash Dattatraya Vyavahare | Ashwani Kumar Ramani
Volume: 5
Issue: 2
Year: 2007





Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks

Author(s): Wei Ren | Hai Jin | Dit-Yan Yeung | Mei Yang
Volume: 4
Issue: 2
Year: 2007





IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems

Author(s): Magdy Saeb | Meer Hamza | Ahmed EL-Shikh
Volume: 4
Issue: 2
Year: 2007





Integrity of mobile agents: a new approach

Author(s): Aneta Zwierko | Zbigniew Kotulski
Volume: 4
Issue: 2
Year: 2007





New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key

Author(s): Jiguo Li | Shuhong Wang
Volume: 4
Issue: 2
Year: 2007





ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings

Author(s): Amit K Awasthi | Sunder Lal
Volume: 4
Issue: 2
Year: 2007





Distributed Cryptographic Computing on Grid

Author(s): Zhonghua Jiang | Dongdai Lin | Lin Xu | Lei lin
Volume: 4
Issue: 2
Year: 2007





Broadcast Authentication With Preferred Verifiers

Author(s): Mahalingam Ramkumar
Volume: 4
Issue: 2
Year: 2007





A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7

Author(s): Leon Pan
Volume: 4
Issue: 2
Year: 2007





How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis

Author(s): Pairat Thorncharoensri | Tianbing Xia | Yi Mu
Volume: 4
Issue: 2
Year: 2007





Improving Indirect Key Management Scheme of Access Hierarchies

Author(s): Brian J. Cacic | Ruizhong Wei
Volume: 4
Issue: 2
Year: 2007





Security Analysis of Double Length Compression Function Based on Block Cipher

Author(s): Pin Lin | Wen-Ling Wu | Chuan-Kun Wu
Volume: 4
Issue: 2
Year: 2007





Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks

Author(s): Asad Amir Pirzada | Chris McDonald
Volume: 3
Issue: 2
Year: 2006





Personality Trait Based Simulation Model of the E-mail System

Author(s): Mark Jyn-Huey Lim | Michael Negnevitsky | Jacky Hartnett
Volume: 3
Issue: 2
Year: 2006





Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks

Author(s): Hamdy S Soliman | Mohammed Omari
Volume: 3
Issue: 2
Year: 2006





A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems

Author(s): Sangook Moon
Volume: 3
Issue: 2
Year: 2006





Joint Sparse Form of Window Three for Koblitz Curve

Author(s): Yong Ding | Kwok-Wo Wong | Yu-Min Wang
Volume: 2
Issue: 2
Year: 2006





New Class of Cryptographic Primitives and Cipher Design for Networks Security

Author(s): Nikolay Moldovyan | A. A. Moldovyan | M. A. Eremeev | N. Sklavos
Volume: 2
Issue: 2
Year: 2006





Active Trial-and-error Attack on SASC Protocols

Author(s): Heeyoul Kim | Younho Lee | Seong-Min Hong | Hyunsoo Yoon
Volume: 2
Issue: 2
Year: 2006





A Study of Micro-payment Based on One-way Hash Chain

Author(s): Min-Shiang Hwang | Pei-Chen Sung
Volume: 2
Issue: 2
Year: 2006





Cryptanalysis of a New Efficient MAKEP for Wireless Communications

Author(s): Jau-Ji Shen | Ching-Ying Lin | Hung-Wen Yang
Volume: 1
Issue: 2
Year: 2005





Self-healing Group Key Distribution

Author(s): Muhammad Junaid Bohio | Ali Miri
Volume: 1
Issue: 2
Year: 2005





Access Control in Networks Hierarchy: Implementation of Key Management Protocol

Author(s): Nicolas Sklavos | Odysseas Koufopavlou
Volume: 1
Issue: 2
Year: 2005





Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types

Author(s): Diaa Salama Abdul Minaam | Hatem M. Abdual-Kader | Mohiy Mohamed Hadhoud
Volume: 11
Issue: 2
Year: 2010





Efficient Cancelable Biometric Key Generation Scheme for Cryptography

Author(s): Sunil V. K. Gaddam | Manohar Lal
Volume: 11
Issue: 2
Year: 2010





Accelerating RSA Encryption Using Random Precalculations

Author(s): Loránd Szőllősi | Tamás Marosits | Gábor Fehér
Volume: 10
Issue: 2
Year: 2010





Provable Partial Key Escrow

Author(s): Kooshiar Azimian | Javad Mohajeri | Mahmoud Salmasizadeh | Samuel S. Wagstaff, Jr.
Volume: 10
Issue: 2
Year: 2010





Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences

Author(s): Tongjiang Yan | Xiaoni Du | Shuqing Li | Guozhen Xiao
Volume: 7
Issue: 2
Year: 2008





A Simple User Authentication Scheme for Grid Computing

Author(s): Rongxing Lu | Zhenfu Cao | Zhenchuan Chai | Xiaohui Liang
Volume: 7
Issue: 2
Year: 2008





Customizing Cellular Message Encryption Algorithm

Author(s): Debdeep Mukhopadhyay | Dipanwita RoyChowdhury
Volume: 7
Issue: 2
Year: 2008





Further Improvements of Fast Encryption Algoirthm for Multimedia

Author(s): Depeng Li | Srinivas Sampalli
Volume: 7
Issue: 2
Year: 2008





A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes

Author(s): L. Herna¡ndez Encinas | A. Martin del Rey | J. Munoz Masquue
Volume: 7
Issue: 2
Year: 2008





Attacking LCCC Batch Verification of RSA Signatures

Author(s): Martin Stanek
Volume: 6
Issue: 2
Year: 2008





An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups

Author(s): Atul Chaturvedi | Sunder Lal
Volume: 6
Issue: 2
Year: 2008





An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture

Author(s): Arshad Aziz | Nassar Ikram
Volume: 5
Issue: 2
Year: 2007





An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme

Author(s): Zichen Li | C. F. Chong | Lucas Chi-Kwong Hui | Siu-Ming Yiu | K. P. Chow | Wai-Wan Tsang | H. W. Chan | Kelvin K. H. Pun
Volume: 5
Issue: 2
Year: 2007





A Traitor Tracing Scheme Based on the RSA System

Author(s): Bo Yang | Hua Ma | Shenglin Zhu
Volume: 5
Issue: 2
Year: 2007





Security Proof of the Original SOK-IBS Scheme

Author(s): Xiao-Ming Lu | Deng-Guo Feng
Volume: 5
Issue: 2
Year: 2007





Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers

Author(s): Liam Keliher
Volume: 5
Issue: 2
Year: 2007





Code-based Ring Signature Scheme

Author(s): Dong Zheng | Xiangxue Li | Kefei Chen
Volume: 5
Issue: 2
Year: 2007





Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach

Author(s): Afrand Agah | Sajal K. Das
Volume: 5
Issue: 2
Year: 2007





Stream or Block Cipher for Securing VoIP?

Author(s): Ashraf D. Elbayoumy | Simon J. Shepherd
Volume: 5
Issue: 2
Year: 2007





Novel Secure Communication Protocol for Conditional Access System

Author(s): Liu Yongliang | Xiaolin Yang | Hongxun Yao | Wen Gao
Volume: 5
Issue: 2
Year: 2007





Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme

Author(s): Minho Kim | Cetin Kaya Koc
Volume: 4
Issue: 2
Year: 2007





Improved Efficient Remote User Authentication Schemes

Author(s): Xiaojian Tian | Robert W. Zhu | Duncan S. Wong
Volume: 4
Issue: 2
Year: 2007





A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices

Author(s): Wassim Itani | Ayman Kayssi | Ali Chehab | Camille Gaspard
Volume: 3
Issue: 2
Year: 2006





An Access Control System with Time-constraint Using Support Vector Machines

Author(s): Chin-Chen Chang | Iuon-Chang Lin | Chia-Te Liao
Volume: 2
Issue: 2
Year: 2006





Cryptanalysis of the Secure Sessions from Weak Secrets Protocols

Author(s): Jolyon Clulow
Volume: 2
Issue: 2
Year: 2006





A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks

Author(s): Animesh Patcha | Jung-Min Park
Volume: 2
Issue: 2
Year: 2006





Construction of Dynamic Threshold Decryption Scheme from Pairing

Author(s): Yu Long | Ke-Fei Chen
Volume: 2
Issue: 2
Year: 2006





Research on Intrusion Detection and Response: A Survey

Author(s): Peyman Kabiri | Ali Ghorbani
Volume: 1
Issue: 2
Year: 2005





A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme

Author(s): Minho Kim | Çtin Kaya Koç
Volume: 1
Issue: 2
Year: 2005





Authenticated Encryption Schemes: Current Status and Key Issues

Author(s): Min-Shiang Hwang | Chi-Yu Liu
Volume: 1
Issue: 2
Year: 2005





An MSS Based on the Elliptic Curve Cryptosystem

Author(s): Hemlal Sahu | Birendra Kumar Sharma
Volume: 11
Issue: 2
Year: 2010





A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol

Author(s): Jie Liu | Jianhua Li
Volume: 11
Issue: 2
Year: 2010





Acceleration of the Elliptic Cryptography with Vector Finite Fields

Author(s): Nikolay A. Moldovyan
Volume: 9
Issue: 2
Year: 2009





An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm

Author(s): Thomas Chardin | Raphaël Marinier
Volume: 9
Issue: 2
Year: 2009





Detecting Scanners: Empirical Assessment on a 3G Network

Author(s): Vincenzo Falletta | Fabio Ricciato
Volume: 9
Issue: 2
Year: 2009





Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms

Author(s): Tzu-Chun Lin
Volume: 9
Issue: 2
Year: 2009





A New Involutory MDS Matrix for the AES

Author(s): Jorge Nakahara Jr | Élcio Abrahão
Volume: 9
Issue: 2
Year: 2009





Remarks on Zhang-Kim's Key Authentication Scheme

Author(s): Jie Liu | Jianhua Li
Volume: 8
Issue: 2
Year: 2009





Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks

Author(s): Chun-Ta Li | Yen-Ping Chu
Volume: 8
Issue: 2
Year: 2009





An Efficient Verifiably Encrypted Signature Scheme without Random Oracles

Author(s): Yang Ming | Yumin Wang
Volume: 8
Issue: 2
Year: 2009





On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal

Author(s): Fouz Sattar | Muid Mufti
Volume: 8
Issue: 2
Year: 2009





Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks

Author(s): Biju Issac
Volume: 8
Issue: 2
Year: 2009





ID-based Signcryption Scheme with (t,n) Shared Unsigncryption

Author(s): Fagen Li | Xiangjun Xin | Yupu Hu
Volume: 3
Issue: 2
Year: 2006





On the Security of Signature Scheme with Message Recovery and Its Application

Author(s): Eun-Jun Yoon | Kee-Young Yoo
Volume: 3
Issue: 2
Year: 2006





A Fast Semantically Secure Public Key Cryptosystem Based on Factoring

Author(s): Sahadeo Padhye | Birendra Kumar Sharma
Volume: 3
Issue: 2
Year: 2006





Security Analysis of Some Batch Verifying Signatures from Pairings

Author(s): Tianjie Cao | Dongdai Lin | Rui Xue
Volume: 3
Issue: 2
Year: 2006





Password Authentication Schemes: Current Status and Key Issues

Author(s): Chwei-Shyong Tsai | Cheng-Chi Lee | Min-Shiang Hwang
Volume: 3
Issue: 2
Year: 2006





Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling

Author(s): Adam J. Rocke | Ronald F. DeMara
Volume: 2
Issue: 2
Year: 2006





Traffic Filtering and Routing in Partially-Hidden Networks

Author(s): D. Nali, A. Miri | C. Adams
Volume: 2
Issue: 2
Year: 2006





Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications

Author(s): Hsien-Chu Wu | Chi-Yu Liu | Shu-Fen Chiou
Volume: 1
Issue: 2
Year: 2005





Blind Collective Signature Protocol Based on Discrete Logarithm Problem

Author(s): Nikolay A. Moldovyan | Alexander A. Moldovyan
Volume: 11
Issue: 2
Year: 2010





A New Secure Remote User Authentication Scheme with Smart Cards

Author(s): Manoj Kumar
Volume: 11
Issue: 2
Year: 2010





Node-failure Tolerance of Topology in Wireless Sensor Networks

Author(s): Liang-Min Wang | Jian-Feng Ma | Yan-Bo Guo
Volume: 7
Issue: 2
Year: 2008





A Comprehensive Secure VoIP Solution

Author(s): Ashraf D. Elbayoumy | Simon Shepherd
Volume: 5
Issue: 2
Year: 2007





Research on Data Hiding Capacity

Author(s): Zhensong Liao | Yan Huang | Chisong Li
Volume: 5
Issue: 2
Year: 2007





An Effective Method to Implement Group Signature with Revocation

Author(s): He Ge
Volume: 5
Issue: 2
Year: 2007





A Forward-Secure User Authentication Scheme with Smart Cards

Author(s): Bin Wang | Zheng-Quan Li
Volume: 3
Issue: 2
Year: 2006





Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object

Author(s): Cheng-Ying Yang | Cheng-Chi Lee | Shu-Yin Hsiao
Volume: 1
Issue: 2
Year: 2005





The Structure of a Signature via the Net

Author(s): Chuen Chuan Huang | Chuen-Der Huang | Shin Ya Huang
Volume: 11
Issue: 2
Year: 2010





Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)

Author(s): Ding Yong | Yin-Fang Hong | Wei-Tao Wang | Yuan-Yuan Zhou | Xiao-Yang Zhao
Volume: 11
Issue: 2
Year: 2010





Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor

Author(s): Mingwu Zhang | Bo Yang | Wenzheng Zhang | Tsuyoshi Takagi
Volume: 12
Issue: 1
Year: 2011





Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks

Author(s): Peyman Kabiri | Mehran Aghaei
Volume: 12
Issue: 1
Year: 2011





Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems

Author(s): Faisal Nabi
Volume: 12
Issue: 1
Year: 2011





Fault Attack and Countermeasures on Pairing Based Cryptography

Author(s): Santosh Ghosh | Debdeep Mukhopadhyay | Dipanwita Roy Chowdhury
Volume: 12
Issue: 1
Year: 2011





New Real Time Multicast Authentication Protocol

Author(s): Riham Abdellatif | Heba Kamal Aslan | Salwa H. Elramly
Volume: 12
Issue: 1
Year: 2011





Digital Signature Scheme with Message Recovery Using Knapsack-based ECC

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar
Volume: 12
Issue: 1
Year: 2011





Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code

Author(s): I-Shi Lee | Wen-Hsiang Tsai
Volume: 10
Issue: 1
Year: 2010





Efficient Nonce-based Authentication Scheme for Session Initiation Protocol

Author(s): Jia Lun Tsai
Volume: 9
Issue: 1
Year: 2009





Resisting Traitors in Linkable Democratic Group Signatures

Author(s): Maged Hamada Ibrahim
Volume: 9
Issue: 1
Year: 2009





Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security

Author(s): M. Razvi Doomun | KMS Soyjaudah
Volume: 9
Issue: 1
Year: 2009





An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization

Author(s): Jyh-Jian Sheu
Volume: 9
Issue: 1
Year: 2009





Sybil Nodes Detection Based on Received Signal Strength Variations within VANET

Author(s): Mohamed Salah Bouassida | Gilles Guette | Mohamed Shawky | Bertrand Ducourthial
Volume: 9
Issue: 1
Year: 2009





A Method for Obtaining Deniable Public-Key Encryption

Author(s): Maged Hamada Ibrahim
Volume: 8
Issue: 1
Year: 2009





A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach

Author(s): Mohamed M. Nasreldin Rasslan | Yasser H. Dakroury | Heba K. Aslan
Volume: 8
Issue: 1
Year: 2009





A Dynamic Authentication Scheme for Mobile Transactions

Author(s): Sathish Babu B. | Pallapa Venkataram
Volume: 8
Issue: 1
Year: 2009





Identity-based Universal Designated Verifier Signature Proof System

Author(s): Xiaofeng Chen | Guomin Chen | Fangguo Zhang | Baodian Wei | Yi Mu
Volume: 8
Issue: 1
Year: 2009





Anonymity in Wireless Broadcast Networks

Author(s): Matt Blaze | John Ioannidis | Angelos D. Keromytis | Tal Malkin | Avi Rubin
Volume: 8
Issue: 1
Year: 2009





Software Implementations of Elliptic Curve Cryptography

Author(s): Zhijie Jerry Shi | Hai Yun
Volume: 7
Issue: 1
Year: 2008





On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks

Author(s): Ye Zhu | Xinwen Fu | Riccardo Bettati
Volume: 7
Issue: 1
Year: 2007





Efficient User Authentication and Key Agreement with User Privacy Protection

Author(s): Wen-Shenq Juang | Jing-Lin Wu
Volume: 7
Issue: 1
Year: 2008





Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing

Author(s): Maged Hamada Ibrahim
Volume: 7
Issue: 1
Year: 2008





Towards a Framework for Federated Global Identity Management

Author(s): Mehrdad Naderi | Jawed Siddiqi | Babak Akhgar | Wolfgang Orth | Norbert Meyer | Miika Tuisku | Gregor Pipan
Volume: 7
Issue: 1
Year: 2008





Detecting and Preventing IP-spoofed Distributed DoS Attacks

Author(s): Yao Chen | Shantanu Das | Pulak Dhar | Abdulmotaleb El Saddik | Amiya Nayak
Volume: 7
Issue: 1
Year: 2008





Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks

Author(s): Falko Dressler
Volume: 7
Issue: 1
Year: 2008





Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach

Author(s): Debabrata Nayak | Deepak B. Phatak | Ashutosh Saxena
Volume: 7
Issue: 1
Year: 2008





New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme

Author(s): Da-Zhi Sun | Zhen-Fu Cao
Volume: 6
Issue: 1
Year: 2008





Performance Improvements on the Network Level Security Protocols

Author(s): Tarek S. Sobh | Ashraf Elgohary | M. Zaki
Volume: 6
Issue: 1
Year: 2008





Re-visiting the One-Time Pad

Author(s): Nithin Nagaraj | Vivek Vaidya | Prabhakar G. Vaidya
Volume: 6
Issue: 1
Year: 2008





Short Designated Verifier Signature Scheme and Its Identity-based Variant

Author(s): Xinyi Huang | Willy Susilo | Yi Mu | Futai Zhang
Volume: 6
Issue: 1
Year: 2008





Group Key Management in MANETs

Author(s): Mohamed Salah Bouassida | Isabelle Chrisment | Olivier Festor
Volume: 6
Issue: 1
Year: 2008





Baseline Profile Stability for Network Anomaly Detection

Author(s): Yoohwan Kim | Ju-Yeon Jo | Kyunghee Kim Suh
Volume: 6
Issue: 1
Year: 2008





Secure Two-Way Transfer of Measurement Data

Author(s): Marko Hassinen | Maija Marttila-Kontio | Mikko Saesmaa | Heli Tervo
Volume: 6
Issue: 1
Year: 2008





A Secure Group Key Management Scheme for Wireless Cellular Systems

Author(s): Hwayoung Um | Edward J. Delp
Volume: 6
Issue: 1
Year: 2008





A Study on the Security of Privacy Homomorphism

Author(s): Yu Yu | Jussipekka Leiwo | Benjamin Premkumar
Volume: 6
Issue: 1
Year: 2008





Constructing Efficient Certificateless Public Key Encryption with Pairing

Author(s): Yijuan Shi | Jianhua Li | Jianjun Shi
Volume: 6
Issue: 1
Year: 2008





A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast

Author(s): Qingyu Zhang | Kenneth L. Calvert
Volume: 6
Issue: 1
Year: 2008





Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace

Author(s): Francesco Palmieri
Volume: 6
Issue: 1
Year: 2008





Statistical Attack Resilient Data Hiding

Author(s): Palak K. Amin | Ning Liu | Koduvayur P. Subbalakshmi
Volume: 5
Issue: 1
Year: 2007





SeReRoM: Secured Reliable Routing Scheme for Multicasting

Author(s): Rajavelu Srinivasan | V. Vaidehi | K. N. Srivathsan | L. Ramesh Babu | C. Karunagaran
Volume: 5
Issue: 1
Year: 2007




